Welcome🖐


Here I share my thoughts on InfoSec news, plus technical guides and writeups.
  • Phishing - Snapped Phish-ing Line

    Phishing Email, malicious attachment inspection

    By Ren Sie
    Refer to Snapped Phish-ing Line for the challenge room on TryHackMe Scenario As an IT department personnel at SwiftSpend Financial, one of your responsibilities is to assist employees with their technical concerns. While everything seemed routine, the situation changed when several employees from various departments began reporting an unusual email... [Read More]
  • Splunk - Benign

    Threat hunting on SIEM (Splunk)

    By Ren Sie
    Refer to Benign for the challenge room on TryHackMe Scenario One of the client’s Intrusion Detection Systems (IDS) flagged a suspicious process on a computer in the HR department, suggesting it might be compromised. We observed tools related to network information gathering and scheduled tasks running on the affected machine,... [Read More]
  • Kibana - ItsyBitsy

    Tracing logs for suspicious activities on Kibana

    By Ren Sie
    Refer to ItsyBitsy for the challenge room on TryHackMe Scenario While monitoring security, Analyst John saw an alert from the IDS system about possible command-and-control (C2) communication involving a user named Browne from HR. A suspicious file with a known malicious pattern was accessed. We’ve pulled a week’s worth of... [Read More]
  • Splunk

    Threat hunting on SIEM (Splunk)

    By Ren Sie
    Refer to Splunk for the challenge room on TryHackMe Scenario SOC Analyst Johny noticed unusual activity in the logs from several Windows machines. It seems that an attacker has gained access to these machines and set up backdoors. Johny's manager has asked him to collect the logs from these suspected... [Read More]